Python module to help in exploitation of the FILE structure in C
☆27Dec 2, 2018Updated 7 years ago
Alternatives and similar repositories for File-xploit
Users that are interested in File-xploit are comparing it to the libraries listed below
Sorting:
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- A python library to find one-gadget☆30Feb 22, 2019Updated 7 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- ☆17May 13, 2019Updated 6 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- A framework provides an interface to monitor and control fuzzers☆30Jul 5, 2023Updated 2 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 9 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- BPF Processor for IDA Python☆53Aug 27, 2018Updated 7 years ago
- GDB for pwn☆11Sep 10, 2025Updated 5 months ago
- ☆12Mar 28, 2022Updated 3 years ago
- my write up about ctf☆15Jan 29, 2018Updated 8 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Hacking on ESR's ctopy the C to Python conversion tool: http://www.catb.org/~esr/ctopy/☆14May 20, 2012Updated 13 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- QEMU to drcov trace file☆11Nov 21, 2020Updated 5 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- Jekyll theme for translated articles☆13Apr 3, 2019Updated 6 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- ☆60Sep 27, 2023Updated 2 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Basic pwntools for Windows☆267Apr 22, 2023Updated 2 years ago